Yesterday one of my friend asked me for help but i was not able to help her as i didn’t know what was the problem exactly. Sometimes it happens that we are not able to detect the problem if we are far away so to overcome this problem we can use a remote control software. I did same and solved her problem and there are manny Remote Control software available with the help of that you can access a far far away system easily .

Remote Control Software: These Software are use to Remotely connect two computers, laptops, mobiles and with the help of some of them you can transfer files between two systems.. So here are the top Remote Control Software below…

All-In-One Software for Remote Support and Online Meetings. TeamViewer connects to any PC or server around the world within a few seconds. You can remote control your partner’s PC as if you were sitting right in front of it. Find out why more than 100 million users trust TeamViewer .

Users worldwide rely on LogMeIn solutions for remote control, file sharing, systems management, data backup, business collaboration and on-demand customer support of PCs, servers, Macintosh computers, smartphones and other connected devices. Our award-winning solutions are easy to try, buy and deploy from any web browser with an Internet connection. Over 125 million devices worldwide have connected to a LogMeIn service.

Founded in 2003, LogMeIn’s world headquarters are located just outside Boston, Massachusetts, with European headquarters in Amsterdam, the Netherlands, Asia Pacific headquarters in Sydney, Australia, and development centers in Budapest and Szeged, Hungary.

TightVNC is a free remote control software package. With TightVNC, you can see the desktop of a remote machine and control it with your local mouse and keyboard, just like you would do it sitting in the front of that computer. TightVNC is free for both personal and commercial usage, with full source code available,useful in administration, tech support, education, and for many other purposes.

With TightVNC, you can:

cut your expenses and save your time on traveling,

help your friends and family to solve problems with their computers remotely,

make sure nothing wrong is happening on your computers when you are away.

You can easily share a remote desktop or control a server over the Internet with Ammyy Admin. No matter where you are, Ammyy Admin makes it safe and easy to quickly access a remote desktop within a few seconds.

If you like post and interested in this type of article just press Subscribe Button Dont Forget Like Our Facebook Page so that you could be aware with every trick and tips.

]]>How to fight with Wireless network cracker and kick them out of your Networkhttp://swissen.org/?p=659
http://swissen.org/?p=659#commentsSun, 23 Sep 2012 05:23:35 +0000http://swissen.org/guru/?p=659

Now a days I see many people who post how to crack a wireless network but here I will show you that how to protect urself from this type of activities and monitor your network activities so if anyone try to access your Network just give him a fight back and secure yourself.

First I will suggest you to create a secure connection and create a strong password you can learn about secure password here just click on secure password.

There are basically two Methods –

Using Backtrack (Advanced Mode): I will show you this technique in my next article when I will show you how they access network and how you can use this against those call themselves Black hats.

Using Different Software’s (Normal Mode): There are many software which can make this work easy for you as you can just monitor people on your network. These Software’s are known as sniffers. I will not make it complex for u people here are some software’s which can help u.

If you like post and interested in this type of article just press Subscribe Button Dont Forget Like Our Facebook Page so that you could be aware with every trick and tips.

a) Ettercap (For Linux): Ettercap is a comprehensive suite for man in the middle attacks. It features sniffing of live connections, content filtering on the fly and many other interesting tricks. It supports active and passive dissection of many protocols and includes many features for network and host analysis.

a) Whos.On.My.WiFi : It is also a good tool with the help of that you can easily find out who is on tour wifi. As the owner of a wireless network, you want to protect it from hackers and freeloaders. Just Download it and be safe.

b) Network Miner is a Network Forensic Analysis Tool (NFAT) for Windows. Network Miner can be used as a passive network sniffer/packet capturing tool in order to detect operating systems, sessions, hostnames, open ports etc.

d) SoftPerfect Network Protocol Analyzer(Supports Windows): QUITE impressive Analyser with the help of that you can easily findout who is on ur wifi and can get all his surfing information as well as all activity information.

Now a days to save our family, friends and children from frauds it is essential to monitor all the activites of your computer. Yes you hear right today i will shown you how to moniter you computer activities without paying a single rupee or dollar. In previos post i discuss about keyloggers and most of you asked me that which keylogger is safe cheap for you people but here i will show you a technique where you don’t need any Keylogger Software. This technique is usefull in Windows 7 as well as in Windows 8 so readers here i will discuss about psr that is known a problem steps recorder and works almost like keylogger. Here i will show you how to use it u just have to follow these simple steps. If you have any problem you can see video reference below.

Step 2. A psr recoder will open just click on the red circled portion and you will hav some option click on settings.

Step 3. In settings you can give a path where you want to save activity information as well as images.

Step 4. There is a option of screen capture you can enable it or disable it nd up to you well i will suugst let it be enable.

Step 5. Click on ok.

These were the settings and now Recording phase is –

Step 1. Now go to main menu and click on start

Step2. Minimize it and when you return just stop it and you will have all the activity report that which are the website are accessed in your computer what are the password and username are used and you can see the screen shots of activities.

If you are using against experts i will prefer you to use Keylogger and you can get detailed knowledge here Click on Keylogger.

so Hav fun……

If you like post and interested in this type of article just press Subscribe Button Dont Forget Like Our Facebook Page so that you could be aware with every trick and tips.

]]>http://swissen.org/?feed=rss2&p=6120Prevent somebody watching your Internet activity… (You r not Safe )http://swissen.org/?p=437
http://swissen.org/?p=437#commentsTue, 04 Sep 2012 16:21:14 +0000http://swissen.org/guru/?p=437Now a days Hackingis on peak. Sometimes people who have a little bit knowledge of networking and pleased to call themselves hacker sometimes trace your IP Address and then analyse your all system configuration and Network Details which they can use against you and can stuck u in any fraud.It is not a big deal if your nabour is waching your internet activity or in college wi-fi network administrator waching your all linkns and activity. So here i am going to give you a magical stick with the help of that you can Defend yourself against network surveillance and traffic analysis.

Here i Will introduce you with tor …

Now What is Tor?

Tor was originally designed, implemented, and deployed as a third-generation onion routing project of the U.S. Naval Research Laboratory. It was originally developed with the U.S. Navy in mind, for the primary purpose of protecting government communications. Today, it is used every day for a wide variety of purposes by normal people, the military, journalists, law enforcement officers, activists, and many others.

Why we should use this

Individuals use Tor to keep websites from tracking them and their family members, or to connect to news sites, instant messaging services, or the like when these are blocked by their local Internet providers. Tor’s hidden services let users publish web sites and other services without needing to reveal the location of the site. Individuals also use Tor for socially sensitive communication: chat rooms and web forums for rape and abuse survivors, or people with illnesses.

If you like post and interested in this type of article just press Subscribe Button Dont Forget Like Our Facebook Page so that you could be aware with every trick and tips.

Here i am not adding any video tutorial because in its official website there are both step by step text as well as the video reference.

So have fun and checkout my other articles and soon i will introduce you with more incredible tips tricks of windows,open source and much more .

Tor improves your security and your privacy through a network of virtual tunnels. With Tor, you have anonymous outgoing connections along with hidden services to protect not only your privacy but to give you more protection against traffic analysis attacks.

As any other solution Tor comes also with several downside you should be aware about. Here is a list of positive and negative point of this tool.

Benifits

It’s completely free and available for all os platforms like windows, Apple,Linux,BSD,Unix and much more.

Encrypts all traffic (incoming and outgoing) between nodes.

It is virtually unbeatable .

Cons

The perfomance is unpredictable as it depends on routes between the Tor network nodes;

Not suitable for p2p applications such as Torrent;

It only protects applications that are configured to work through Tor.

While Tor blocks attackers on your local network from discovering or influencing your destination, it opens new risks: malicious or misconfigured Tor exit nodes can send you the wrong page, or even send you embedded Java applets disguised as domains you trust.”

Now if You intersted in tor Mechanism then you can easily understand this with the below images but if you are intrested in deep study you can checkout official website but i will not recomend you just install it and hav fun..

If you like post and interested in this type of article just press Subscribe Button Dont Forget Like Our Facebook Page so that you could be aware with every trick and tips.

I Bought a Soni vaio laptop and soon it came to know that my Dvd rom was not working but there was no problem as I always install windows with the help of pen drives but one day a critical condition came in front of me then I use this method to format the windows which I am going to show you so there is no problem if your Cdrom or Dvd rom is not working you can format your computer or laptop with a single pen drive so here we go.

Hope you have download the files now just extract these files somwhere

When you will extract the file you will findout two folders with the name of BOOTSECT and the other USB_Prep8 in it.

Go to the Usb_prep8 folder and open the file USB_Prep8.cmd file. Now you can see a command prompt window.

The window will ask you to press any key and when you do so a new USB_Prep8 window will open. Remember do not close the command prompt window now.

Now set the path of your USB drive in the USB_Prep8 window and start formatting your pen drive. DO NOT close any of the windows open.

Now open a new command prompt window,

Now navigate to the bootsect folder in this window.

Once you reach the bootsect folder type “bootsect.exe /nt52 g:” where g is the letter attached to your USB flash drive.

Once you do this you will see a message that bootcode was updated. Now you can close this command prompt window but not the other one as yet.

now go the PeToUSb window and close it. Again do not close close the USB_prep8 command prompt window.

After you have closed this window you should see a list of 8 options in the command prompt window.

Select the first option and enter the location of your windows installation disc.

The second option will ask you to enter a drive letter. Assign random letter to this option as this will be a virtual drive. Do not assign a letter that is already attached to a drive on your computer.

Select option 3 and enter the drive letter for your flash drive.

Select 4 and follow the instructions as they build up on your computer screen. Rest is easy following.

It will take about 15 to 20 minutes you will have a USB drive that will be similar in action to a windows installation disc. Now we begin the procedure for installing XP on your netbook or your computer with the damaged cd rom drive. Remember your computer must be able to boot from the usb drive mode. Once you have set your computer to boot from USB follow the given steps:

Insert the USB drive you have prepared just now into any of the USB ports on your computer.

Let your computer boot from the USB drive

From the two options select option 2 and let start the text based installation.

Delete all the partitions on your hard drive lest it will result in hal.dll or other issues.

Now let the format go on and once setup restarts boot again from the USB drive and now chose the GUI option to boot.

Again after the installation completes you may face problems while booting from the hard disk. If you face a problem, boot again from the USB Drive and GUI option. Now when XP boots type msconfig in run and go to boot.ini. Check all boot batchs may solve your problem. If it does not get solved, try changing the boot path in your boot.ini file into something like this:‘multi(o)disk(0)rdisk(o)partition(1)Windows=”Windows XP Pro” /fastdetect’.

This is only for educational awareness and i will suggest you buy products licence from the manufactures .

Well Yes you can RUN any trial version of the software forever without entering any license key or getting Serials, this is a Genuine method and its really popular. We will use a software called Time Stopper which will stop the time for the software so it will work till your computer works.Time Stopper is a tiny utility which eliminate the time limit existing into trial software usage period.

Time Stopper works with any software executable file and practically will extend the trial period of the program for an unlimited amount of time.

Time Stopper is very easy to install and use: you just have to browse for the executable file of trial program (generally located in C:Program Files) and select the new installation date. Now, your program trial period will be automatically extended to another 30 / 90 days, depending on the software.

2. After downloading the above software extract it and RUN it and you will have to install with the help of internet connection and then click on install after installation you will see something like below

3. Now here you simply have to choose the software which is going to be expired and you wanna use it as a trial again.

4. After choosing a valid .exe application you have choose a date, well you have to choose something between your trial software date like 2 days before its going to be expired.

5. Now enter a new name for the new valid shortcut and click Create Desktop Shortcut.

Generally we see in social sites people post Hack Facebook, orkut, gmail, passwords and all these things with key-loggers.

Now What exactly a keylogger ???

A keylogger is a type of surveillance software that has the capability to record every keystroke you make to a log file. A keylogger also know as keystroke logger is software or hardware device which monitors each and every key typed by you on your keyboard. You can not identify the presence of keylogger on your computer since it runs in background and also it is not listed in task manager or control panel. A keylogger recorder can record Chat history, instant messages, e-mail, and any information you type using your keyboard. The log file created by the keylogger can then be sent to a specified receiver. Some keylogger record desktop screen. Unfortunately, keyloggers can also be embedded in spyware allowing your information to be transmitted to an unknown third party.

Definition: A keylogger is a hardware device or a software program that records the real time activity of a computer user including the keyboard keys they press.It can be used by parents to keep eye on their childrens or company owner to spy on their employes.

Is Key-logger harmful for you ?

It can be used by your enemy or friend to get sensitive information such as your username and password, Bank credit card details etc.

Example: You login in to your Facebook account from a computer in which keylogger is installthen your username and password will be captured.

Types of keyloggers

There are two types of keylogger hardware keylogger and software keylogger. Software keylogger is install in your computer where as a Hardware keylogger is attached to your keyboard.

HARDWARE KEYLOGGER

SOFTWARE KEYLOGGER

How to Protect yourself from keyloggers ?

Never use your online banking from cyber cafe. If you want to use then you can try this method.open notepad and type anything Then copy and paste each word that comes in your username or password.

You can even use above method to protect your facebook profile, yahoo or gmail id.

When you enter cyber cafe make sure that no hardware device is attached to keyboard wire. Its look something similar to above image.

A keylogger program does not require physical access to the user’s computer. It can be downloaded on purpose by someone who wants to monitor activity on a particular computer or it can be downloaded unwittingly as spyware and executed as part of a rootkit or remote administration (RAT) Trojan horse. A keylogger program typically consists of two files that get installed in the same directory: a dynamic link library (DLL) file (which does all the recording) and an executable file (.EXE) that installs the DLL file and triggers it to work. The keylogger program records each keystroke the user types and uploads the information over the Internet periodically to whoever installed the program.

Anti keyloggers

An anti keylogger is a piece of software specifically designed to detect keyloggers on a computer, typically comparing all files in the computer against a database of keyloggers looking for similarities which might signal the presence of a hidden keylogger. As anti keyloggers have been designed specifically to detect keyloggers, they have the potential to be more effective than conventional anti virus software; some anti virus software do not consider certain keyloggers a virus, as under some circumstances a keylogger can be considered a legitimate piece of software.

Live CD/USB

Rebooting the computer using a Live CD or write-protected Live USB is a possible countermeasure against software keyloggers if the CD is clean of malware and the operating system contained on it is secured and fully patched so that it cannot be infected as soon as it is started. Booting a different operating system does not impact the use of a hardware or BIOS based keylogger.

Anti-spyware / Anti-virus programs

Many anti-spyware applications are able to detect some software keyloggers and quarantine, disable or cleanse them.No software-based anti-spyware application can be 100% effective against all keyloggers.

Why should use keylogger ?

Although keylogger programs are promoted for benign purposes like allowing parents to monitor their children’s whereabouts on the Internet, most privacy advocates agree that the potential for abuse is so great that legislation should be enacted to clearly make the unauthorized use of keyloggers a criminal offense.